Validating Identity Evidence Identity Evidence Collection and Validation

E NROLLMENT I DENTITY P ROOFING 17 T hi s pub lic at ion is av a ila bl e f ree o f c h a rge f rom : ht tp s : d oi .or g 10. 6 028 N IS T.S P .8 -6 3a Strength Qualities of Identity Evidence • The: o Issued evidence contains a photograph or biometric template of any modality of the person to whom it relates, OR o Applicant proves possession of an AAL2 authenticator bound to an IAL2 identity, at a minimum. • Where the issued evidence includes digital information, that information is protected using cryptographic or proprietary methods, or both, and those methods ensure the integrity of the information and enable the authenticity of the claimed issuing source to be confirmed. • Where the issued evidence contains physical security features, it requires proprietary knowledge and proprietary technologies to be able to reproduce it. • The evidence is unexpired. Superior • The issuing source of the evidence confirmed the claimed identity by following written procedures designed to enable it to have high confidence that the source knows the real-life identity of the subject. Such procedures shall be subject to recurring oversight by regulatory or publicly accountable institutions. • The issuing source visually identified the applicant and performed further checks to confirm the existence of that person. • The issuing process for the evidence ensured that it was delivered into the possession of the person to whom it relates. • The evidence contains at least one reference number that uniquely identifies the person to whom it relates. • The full name on the evidence must be the name that the person was officially known by at the time of issuance. Not permitted are pseudonyms, aliases, an initial for surname, or initials for all given names. • The evidence contains a photograph of the person to whom it relates. • The evidence contains a biometric template of any modality of the person to whom it relates. • The evidence includes digital information, the information is protected using cryptographic or proprietary methods, or both, and those methods ensure the integrity of the information and enable the authenticity of the issuing source to be confirmed. • The evidence includes physical security features that require proprietary knowledge and proprietary technologies to be able to reproduce it. • The evidence is unexpired.

5.2.2 Validating Identity Evidence

Once the CSP obtains the identity evidence, the accuracy, authenticity, and integrity of the evidence and related information is checked against authoritative sources in order to determine that the presented evidence: • Is genuine, authentic, and not a counterfeit, fake, or forgery; E NROLLMENT I DENTITY P ROOFING 18 T hi s pub lic at ion is av a ila bl e f ree o f c h a rge f rom : ht tp s : d oi .or g 10. 6 028 N IS T.S P .8 -6 3a • Contains information that is correct; and • Contains information that relates to a real-life subject. Table 5-2 lists strengths, ranging from unacceptable to superior, of identity validation performed by the CSP to validate the evidence presented for the current proofing session and the information contained therein. Table 5-2 Validating Identity Evidence Strength Methods Performed by the CSP Unacceptable • Evidence validation was not performed, or validation of the evidence failed. Weak • All personal details from the evidence have been confirmed as valid by comparison with information held or published by an authoritative source. Fair • Attributes contained in the evidence have been confirmed as valid by comparison with information held or published by the issuing source or authoritative sources, OR • The evidence has been confirmed as genuine using appropriate technologies, confirming the integrity of physical security features and that the evidence is not fraudulent or inappropriately modified, OR • The evidence has been confirmed as genuine by trained personnel, OR • The evidence has been confirmed as genuine by confirmation of the integrity of cryptographic security features. Strong • The evidence has been confirmed as genuine: o using appropriate technologies, confirming the integrity of physical security features and that the evidence is not fraudulent or inappropriately modified, OR o by trained personnel and appropriate technologies, confirming the integrity of the physical security features and that the evidence is not fraudulent or inappropriately modified, OR o by confirmation of the integrity of cryptographic security features. • All personal details and evidence details have been confirmed as valid by comparison with information held or published by the issuing source or authoritative sources. E NROLLMENT I DENTITY P ROOFING 19 T hi s pub lic at ion is av a ila bl e f ree o f c h a rge f rom : ht tp s : d oi .or g 10. 6 028 N IS T.S P .8 -6 3a Strength Methods Performed by the CSP Superior • The evidence has been confirmed as genuine by trained personnel and appropriate technologies including the integrity of any physical and cryptographic security features. • All personal details and evidence details from the evidence have been confirmed as valid by comparison with information held or published by the issuing source or authoritative sources. Training requirements for personnel validating evidence SHALL be based on the policies, guidelines, or requirements of the CSP or RP.

5.3 Identity Verification